Global Journal of Management and Business Research, A: Administration and Management, Volume 23 Issue 10

Table 1: Summary of Referenced Research Papers A Survey on Digitization of Shed Management for Indian Railways Global Journal of Management and Business Research ( A ) XXIII Issue X Version I Year 2023 76 © 2023 Global Journals Sr. No. Work/Paper Title Author Main Tech Domain Sub Tech Domain Features Summary 1. A Survey on Current Technologies for Web Development (2020) [1] A. V. Akhil Krishna & Dr. Padmashree T Web Technolo gy Languages, Frameworks, Techstack − Scalability − Optimal performance This paper examines various technologies used in web development, with a particular focus on Node.js, Mongo DB, and JavaScript. 2. Research and Application of Template Engine for Web Backend Based on My Batis-Plus (2019) [2] Yao Zhang et al. Backend Technolo gy Template engine − MVC pattern − SSM framework − RESTful coding This paper discusses software development, specifically focusing on back-end web service development using Java Web & separation of front- end and back-end development, with different professionals handling each part. 3. Comparative Studies of Load Balancing with Control and Optimization Techniques (2005) [33] Yixin Diao et al. Backend Develop ment Load Balancing, Database, Server, Feedback controlling − DB2 Universal Database Server − constrained optimization − marginal gains It presents load balancing as a constrained optimization problem and explores two load balancing controllers developed using feedback control and optimization theory. 4. Design and Development of Backend Application for Public Complaint Systems Using Microservice Spring Boot(2017) [19] Hatma Suryotrisongko et al. Backend Develop ment Microservice technology, microservice architecture − Springboot framework The paper discusses a research study that developed a public complaint application using a microservice architecture and the Spring boot framework, which was deployed in the cloud. 5. Enhancing the Performance of the Website through Web Log Analysis and Improvement (2012) [24] Arvind K Sharma, & P C Gupta Monitorin g and Logging Web traffic, Web log files − Webalizer − Web log analysis − Volume analysis The paper is organized into different sections, including a description of web logs, related work, experiments and results, and a conclusion with future work. The paper also discusses the analysis of daily activity statistics from a web server to enhance website and business performance. 6. Web Load Balance and Cache Optimization Design based Nginx Under High Concurrency Environment (2012) [35] Xiaoni Chi Backend Develop ment Load balancing, Caching, Concurrency − Nginx − cluster environment − Web caching optimization Paper result indicated that an Nginx- based program is not only viable but also highly effective, making it ideal for high concurrency environments that rely on load balancing and caching 7. Secure Access to the Network Infrastructure(2019)[32] Jeff Hayes & Alcatel Ind Web Security Network security, authentication − Kerberos − multiple- factor authenticatio n − firewalls This paper discusses the importance of robust network security measures, with a particular focus on authentication techniques. 8. Light-weight Authentication & Authorization Protocol for Seamless Video Services Application (2011) [31] Jia-Yin Tian et al. Web Security Authentication & Authorization Protocol − SVSAAP − EAP-TLS − HB series protocols The authors outline the structure and functionality of SVSAAS and present SVSAAP, an associated protocol based on Challenge Response Handshake Authentication Protocol and lightweight certificates. 9. Authentication and Authorization in microservices Architecture: A Systematic Literature review (2022) [30] Murilo Almeida & Edna Canedo Web Security Microservices, Authentication and authorization, API Gateway − O Auth 2.0 − JWT − Open ID Connect The paper highlights a significant gap in research related to security in microservices architecture, particularly concerning authenti-cation and authorization. Several mechanisms, such as OAuth 2.0, Json Web Token (JWT), and API Gateway, can mitigate security risks, but more practical implementations are needed. 10. A Performance Comparison of Cloud- based Container Yao Pan et al. Cloud Infrastructure- as-a-Service, Virtual − Docker Swarm − Kubernetes In this paper we compare the benefits and overheads incurred by the most popular open-source container

RkJQdWJsaXNoZXIy NTg4NDg=